Cloud Threat Hunting

Cloud Threat Hunting

RSA Conference via YouTube Direct link

Adversary - Successful Login

28 of 35

28 of 35

Adversary - Successful Login

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cloud Threat Hunting

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Missed Opportunities
  2. 2 Roadmap
  3. 3 Finger Pointing
  4. 4 Lack of Visibility
  5. 5 Our Cloud Threat Simulation
  6. 6 AWS Cloud Hacking Toolkit
  7. 7 Microsoft Cloud Environment
  8. 8 Meet The Cloud Hacker
  9. 9 Instrumentation
  10. 10 An Anonymous Threat
  11. 11 Threat Hunting - Create Hypothesis
  12. 12 AWS Tools
  13. 13 Guard Duty - "Hacker" Operating System Alert
  14. 14 Alert Fatigue
  15. 15 Interview with Anna Demin
  16. 16 Hunting With Splunk
  17. 17 Getting Data Into Splunk
  18. 18 Alert! The Adversary Lists Buckets
  19. 19 Alert! The Adversary Checks Available Functions
  20. 20 The User Agent String: A Wealth of Information
  21. 21 Chained with...
  22. 22 The Meatballs Are Gone!
  23. 23 New Host Configuration
  24. 24 Microsoft Audit Log Search
  25. 25 Can You Trust Your Tools?
  26. 26 Use Powershell Instead of the GUI for Better Results
  27. 27 Splunk Joins The Hunt!
  28. 28 Adversary - Successful Login
  29. 29 Adversary Geolocation
  30. 30 Create Hypothesis - Credential Stuffing
  31. 31 Mirroring Network Traffic-VTAP
  32. 32 Hosted Network Monitoring - Extra Hop
  33. 33 Current Hypothesis
  34. 34 Takeaways
  35. 35 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.